From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id DA699384C002; Wed, 24 Mar 2021 22:07:49 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org DA699384C002 From: "cvs-commit at gcc dot gnu.org" To: gcc-bugs@gcc.gnu.org Subject: [Bug sanitizer/96318] FAIL: c-c++-common/asan/strncpy-overflow-1.c * output pattern test with C on Darwin Date: Wed, 24 Mar 2021 22:07:49 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: sanitizer X-Bugzilla-Version: 11.0 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: cvs-commit at gcc dot gnu.org X-Bugzilla-Status: ASSIGNED X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: iains at gcc dot gnu.org X-Bugzilla-Target-Milestone: 9.4 X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: gcc-bugs@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-bugs mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Mar 2021 22:07:50 -0000 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D96318 --- Comment #4 from CVS Commits --- The releases/gcc-10 branch has been updated by Iain D Sandoe : https://gcc.gnu.org/g:716d345c237f030a3e85d7410b06a8c1ac4c46fb commit r10-9539-g716d345c237f030a3e85d7410b06a8c1ac4c46fb Author: Iain Sandoe Date: Wed Mar 17 13:05:47 2021 +0000 testsuite, Darwin : Fix the asan/strncpy-overflow-1 test. 1. To be more compatible with Linux, Darwin testcases that include string.h should set _FORTIFY_SOURCE=3D0 since, otherwise, it will be defaulted on and the _chk versions of the string builtins will be used. This testcase fails otherwise because there's no convenient way to disable the _chk builtins. 2. The system tool that handles symbolization (atos) is not reliable with GCC's DWARF-2 output but, fortunately, all the platform versions that support the current sanitizers are able to handle dwarf-3 for this testcase. gcc/testsuite/ChangeLog: PR sanitizer/96318 * c-c++-common/asan/strncpy-overflow-1.c: Add _FORTIFY_SOURCE= =3D0 and -gdwarf-3 to the command line options. Adjust the expected line numbers for the revised options header. (cherry picked from commit c86c5195c8c02f5891a222f498c074b373aa946c)=